netobserv-ebpf-agent
netobserv-ebpf-agent copied to clipboard
fix(deps): update go modules
This PR contains the following updates:
| Package | Change | Age | Confidence | Type | Update |
|---|---|---|---|---|---|
| github.com/cenkalti/backoff/v5 | v5.0.2 -> v5.0.3 |
indirect | patch | ||
| github.com/containernetworking/cni | v1.1.2 -> v1.3.0 |
indirect | minor | ||
| github.com/containernetworking/plugins | v1.2.0 -> v1.8.0 |
indirect | minor | ||
| github.com/coreos/go-iptables | v0.6.0 -> v0.8.0 |
indirect | minor | ||
| github.com/emicklei/go-restful/v3 | v3.12.2 -> v3.13.0 |
indirect | minor | ||
| github.com/go-logfmt/logfmt | v0.6.0 -> v0.6.1 |
indirect | patch | ||
| github.com/go-openapi/jsonpointer | v0.21.1 -> v0.22.1 |
indirect | minor | ||
| github.com/go-openapi/jsonreference | v0.21.0 -> v0.21.2 |
indirect | patch | ||
| github.com/go-openapi/swag | v0.23.1 -> v0.25.1 |
indirect | minor | ||
| github.com/grafana/regexp | a468a5b -> f7b3be9 |
indirect | digest | ||
| github.com/grpc-ecosystem/grpc-gateway/v2 | v2.27.1 -> v2.27.3 |
indirect | patch | ||
| github.com/ip2location/ip2location-go/v9 | v9.7.1 -> v9.8.0 |
indirect | minor | ||
| github.com/jotak/go-ipfix | 407c539 -> 961f78e |
replace | digest | ||
| github.com/klauspost/cpuid/v2 | v2.2.11 -> v2.3.0 |
indirect | minor | ||
| github.com/mailru/easyjson | v0.9.0 -> v0.9.1 |
indirect | patch | ||
| github.com/minio/crc64nvme | v1.0.2 -> v1.1.1 |
indirect | minor | ||
| github.com/netobserv/loki-client-go | 526b43e -> f26971f |
indirect | digest | ||
| github.com/ovn-org/libovsdb | ce19516 -> 8a0705f |
indirect | digest | ||
| github.com/ovn-org/ovn-kubernetes/go-controller | 57a2590 -> ef92f78 |
require | digest | ||
| github.com/pion/logging | v0.2.3 -> v0.2.4 |
indirect | patch | ||
| github.com/prometheus/procfs | v0.16.1 -> v0.17.0 |
indirect | minor | ||
| github.com/prometheus/prometheus | v0.304.0 -> v0.306.0 |
indirect | minor | ||
| github.com/safchain/ethtool | v0.5.10 -> v0.6.2 |
indirect | minor | ||
| github.com/spf13/cobra | v1.9.1 -> v1.10.1 |
indirect | minor | ||
| github.com/spf13/pflag | v1.0.9 -> v1.0.10 |
indirect | patch | ||
| github.com/tinylib/msgp | v1.3.0 -> v1.4.0 |
indirect | minor | ||
| github.com/urfave/cli/v2 | v2.27.6 -> v2.27.7 |
indirect | patch | ||
| github.com/vishvananda/netlink | v1.3.1-0.20250425193846-9d88d8385bf9 -> v1.3.1 |
require | patch | ||
| github.com/vmware/go-ipfix | v0.15.0 -> v0.16.0 |
require | minor | ||
| github.com/xrash/smetrics | 686a1a2 -> 55b8f29 |
indirect | digest | ||
| go.opentelemetry.io/auto/sdk | v1.1.0 -> v1.2.1 |
indirect | minor | ||
| go.opentelemetry.io/otel | v1.37.0 -> v1.38.0 |
indirect | minor | ||
| go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc | v1.37.0 -> v1.38.0 |
indirect | minor | ||
| go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp | v1.37.0 -> v1.38.0 |
indirect | minor | ||
| go.opentelemetry.io/otel/exporters/otlp/otlptrace | v1.37.0 -> v1.38.0 |
indirect | minor | ||
| go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc | v1.37.0 -> v1.38.0 |
indirect | minor | ||
| go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp | v1.37.0 -> v1.38.0 |
indirect | minor | ||
| go.opentelemetry.io/otel/metric | v1.37.0 -> v1.38.0 |
indirect | minor | ||
| go.opentelemetry.io/otel/sdk | v1.37.0 -> v1.38.0 |
indirect | minor | ||
| go.opentelemetry.io/otel/sdk/metric | v1.37.0 -> v1.38.0 |
indirect | minor | ||
| go.opentelemetry.io/otel/trace | v1.37.0 -> v1.38.0 |
indirect | minor | ||
| go.opentelemetry.io/proto/otlp | v1.7.0 -> v1.8.0 |
indirect | minor | ||
| go.yaml.in/yaml/v2 | v2.4.2 -> v2.4.3 |
indirect | patch | ||
| golang.org/x/crypto | v0.41.0 -> v0.42.0 |
indirect | minor | ||
| golang.org/x/net | v0.43.0 -> v0.44.0 |
indirect | minor | ||
| golang.org/x/oauth2 | v0.30.0 -> v0.31.0 |
indirect | minor | ||
| golang.org/x/term | v0.34.0 -> v0.35.0 |
indirect | minor | ||
| golang.org/x/text | v0.28.0 -> v0.29.0 |
indirect | minor | ||
| golang.org/x/time | v0.11.0 -> v0.13.0 |
indirect | minor | ||
| google.golang.org/genproto/googleapis/api | 8d1bb00 -> 65f7160 |
indirect | digest | ||
| google.golang.org/genproto/googleapis/rpc | 8d1bb00 -> 65f7160 |
indirect | digest | ||
| google.golang.org/grpc | v1.75.0 -> v1.76.0 |
require | minor | ||
| google.golang.org/protobuf | v1.36.9 -> v1.36.10 |
require | patch | ||
| gopkg.in/evanphx/json-patch.v4 | v4.12.0 -> v4.13.0 |
indirect | minor | ||
| k8s.io/component-base | v0.32.3 -> v0.34.1 |
indirect | minor | ||
| k8s.io/kube-openapi | f3f2b99 -> 589584f |
indirect | digest | ||
| k8s.io/utils | 4c0f3b2 -> bc988d5 |
indirect | digest | ||
| sigs.k8s.io/controller-runtime | v0.20.4 -> v0.22.2 |
indirect | minor | ||
| sigs.k8s.io/json | cfa47c3 -> 2d32026 |
indirect | digest |
Release Notes
containernetworking/cni (github.com/containernetworking/cni)
v1.3.0
What's Changed
- RFC - Support safe subdirectory-based plugin conf loading by @bleggett in #1052
This adds a new config flag loadPluginsFromFolder - if present, for a given named network bar, plugin configuration objects will be loaded from <path-to-bar-network-config-file>/bar/xxx.conf. This may be useful for vendors providing chained plugins: you can add your plugin to a chain without needing to edit the file in-place.
New Contributors
- @bleggett made their first contribution in #1052
Full Changelog: https://github.com/containernetworking/cni/compare/v1.2.3...v1.3.0
v1.2.3: libcni v1.2.3
This is a minor release to correct a divergence between the specification and libcni. In this case, the specification was updated, as it concerns a new feature, GC, that is not yet deployed.
What's Changed
v1.2.2: libcni v1.2.2
What's Changed
Full Changelog: https://github.com/containernetworking/cni/compare/v1.2.1...v1.2.2
v1.2.1: CNI Spec v1.1 / libcni v1.2.1
This is a minor release that fixes some small bugs:
Improvements
- (#1098). SPEC: add warning about preserving shared resources for GC
- (#1090). Spec, libcni: add disableGC flag This allows administrators to disable garbage collection in exceptional circumstances, such as multiple runtimes sharing a network configuration.
Bug fixes:
- (#1097). Fix faulty json.Marshal behavior for embeds types.NetConf Fix #1096
- (#1095). libcni: always delete the cache on conflist for CNI DEL This aligns the call with
DelNetwork, and allows CRIO tests to bump
v1.2.0: CNI spec v1.1 / libcni v1.2.0
This is libcni v1.2.0, which releases the new CNI spec version v1.1.0.
Major changes:
GC verb
The GC verb allows runtimes to specify the set of known-good attachments, allowing plugins to clean up stale and leaked resources such as IPAM reservations. Libcni will also synthesize a CNI DEL for any stale cached attachments, so all users will have a form of GC, even if their plugins do not support CNI v1.1
STATUS verb
The STATUS verb allows a plugin to report its readiness to accept ADD requests. Runtimes such as containerd and cri-o will no longer have to rely merely on the presence of a CNI configuration file to determine network readiness.
Version negotiation
CNI configurations may now contain multiple versions, so that an administrator can opportunistically update the protocol version without breaking older runtimes:
{
"cniVersion": "1.0.0",
"cniVersions": ["1.0.0", "1.1.0"]
}
New fields
A number of new fields have been added to the result type:
- (#1060). Add MTU to CNI result
- (#1068). Add Scope property for routes Fixes: #598
- (#1069). Add SocketPath/PciID to Interface struct This is to resolve: #1050
- (#1062). Add table ID property for routes Fixes #1061
- (#1041). Add route attributes - MTU, AdvMSS, Priority
Other improvements
containernetworking/plugins (github.com/containernetworking/plugins)
v1.8.0: CNI plugins v1.8.0
The Bridge CNI plugin has removed limitations on VLAN trunk implementation. This aligns with recommended access and trunk port configurations, ensuring proper VLAN isolation and enhanced usability.
What's Changed
- Allow vlan parameter to set native vlan on trunk ports by @mlguerrero12 in #1180
- Set default value of PreserveDefaultVlan to False by @mlguerrero12 in #1181
- remove duplicate route.Table and route.Scope assignments by @runsisi in #1192
- Set value of gw to nil for opt121 routes in DHCP by @omartin2010 in #1187
New Contributors
- @runsisi made their first contribution in #1192
- @omartin2010 made their first contribution in #1187
Full Changelog: https://github.com/containernetworking/plugins/compare/v1.7.0...v1.8.0
v1.7.1: CNI plugins v1.7.1
What's Changed
(Administrative note: the GitHub release v1.7.0 somehow got split in to two immutable releases. v1.7.1 is a re-release that corrects the issue. Apologies for the trouble).
New features / options
- bridge: Add option to enable port isolation by @ormergi in #1141
- Add a new firewall ingress-policy "isolated" by @swagatbora90 in #1140
Other improvements
- host-device: Return interface name in result by @sriramy in #1147
- Add retries for netlink calls that may return a EINTR by @adrianmoisey in #1154
- Enable KeepAddrOnDown for ipv6 addresses by @mlguerrero12 in #1155
- Implement exponential backoff in vrf plugin by @mlguerrero12 in #1156
Bug fixes
- DHCP lease maintenance should terminate when interface no longer exists. by @dougbtv in #1143
- Fix addresses and routes reinserted to the VRF by @mlguerrero12 in #1151
- Check error returned by ipv6 SettleAddresses by @mlguerrero12 in #1168
New Contributors
- @sriramy made their first contribution in #1147
- @swagatbora90 made their first contribution in #1140
- @dougbtv made their first contribution in #1143
- @adrianmoisey made their first contribution in #1154
Full Changelog: https://github.com/containernetworking/plugins/compare/v1.6.2...v1.7.1
v1.7.0
v1.6.2
(administrative note: release v1.6.1 was somehow double-created in GitHub; v1.6.2 is identical but fixes the duplication.)
What's Changed
- portmap: fix nftables backend by @champtar in #1116
- ipmasq: fix nftables backend by @champtar in #1120
- portmap: fix iptables conditions detection by @champtar in #1117
Full Changelog: https://github.com/containernetworking/plugins/compare/v1.6.0...v1.6.2
v1.6.1
v1.6.0: CNI plugins v1.6.0
This is the v1.6.0 release of the CNI community plugins.
Changelog
Important
- revert htb changes due to ongoing issues and missing maintainer by @h0nIg in #1105. This reverts the (undocumented) feature added in v1.5 where traffic from a specific CIDR would be exempted from bandwidth shaping. Unfortunately the implementation was lacking. We hope to re-add this feature in the future.
New features
- nftables support for ipmasq and portmap by @danwinship in #935
- dhcp: Add priority option to dhcp. by @lisongmin in #1091
CNI v1.1 support
- Use of Scope for routes in IPAM by @LionelJouin in #1087
- Pass status along ipam update by @LionelJouin in #1082
Other improvements
- macvlan: add bcqueuelen setting by @champtar in #1074
- SBR: option to pass the table id by @LionelJouin in #1088
- host-device: use temp network namespace for rename by @champtar in #1073
Fixes
- Fix unnecessary retrying when the link is down in dhcp by @lisongmin in #1076
- Fix inadvertent txqueuelen being set to zero by @gudmundur in #1100
- VRF: Wait for the local/host routes to be added by @LionelJouin in #1104
- fix(dhcp): can not renew an ip address by @lisongmin in #1092
Misc / CI
- Change chown to change current dir as well by @s1061123 in #1058
- ci, go.mod: bump to go 1.23 by @squeed in #1094
- Ignore link-local routes in SBR tests by @LionelJouin in #1102
New Contributors
- @lisongmin made their first contribution in #1076
- @LionelJouin made their first contribution in #1088
- @gudmundur made their first contribution in #1100
- @h0nIg made their first contribution in #1105
Full Changelog: https://github.com/containernetworking/plugins/compare/v1.5.1...v1.6.0
v1.5.1
What's Changed
- Fix release tar images' owner to root by @s1061123 in #1054
Full Changelog: https://github.com/containernetworking/plugins/compare/v1.5.0...v1.5.1
v1.5.0: CNI Plugins v1.5.0
What's Changed
New Features:
- Support DeviceID on Auxiliary Bus by @adrianchiris in #1003
- Dev/exclude subnets from traffic shaping by @oOraph in #921
Fixes:
- Fix release script in github action by @s1061123 in #1037.
- Use temporary name for netdevice when moving in/out of NS by @adrianchiris in #1002
New Contributors
- @oOraph made their first contribution in #921
- @samuelkarp made their first contribution in #1029
- @testwill made their first contribution in #1034
Full Changelog: https://github.com/containernetworking/plugins/compare/v1.4.1...v1.5.0
v1.4.1
v1.4.0: CNI Plugins v1.4.0
New features:
- (#832). tap: allow for a tap device to be created as a bridge port
- (#914). [tuning] add ability to set tx queue len
Improvements:
- (#969). Add CNI_NETNS_OVERRIDE
- (#979). Add ndisc_notify in ipvlan for ipv6 ndp
- (#974). macvlan: enable ipv6 ndisc_notify
- (#950). Create IPAM files with 0600 permissions
- (#924). More efficient iptables usage.
- (#902). spoofcheck: Make use of go-nft's ApplyConfigEcho(). This is much faster
- (#874). Add routes propagation for VRF plugin
Build:
Bug fixes:
- (#954). macvlan cmdDel: handle deletion when master has been deleted
- (#927). vrf: fix route filter to use output iface
v1.3.0: CNI Plugins v1.3.0
This release introduces a new plugin: tap. Thanks to @mmirecki for contributing this
New features:
- (#784). tap: This PR adds a plugin to create tap devices.
- (#829). bridge: add vlan trunk support
- (#875). bridge: Add parameter to disable default vlan
- (#814). macvlan: Add support for in-container master
- (#813). ipvlan: Add support for in-container master
- (#781). vlan: Add support for in-container master
Improvements:
- (#880). bridge: read only required chain on cni del instead of the entire ruleset
- (#873). bridge, spoof check: remove drop rule index
Bug fixes:
coreos/go-iptables (github.com/coreos/go-iptables)
v0.8.0
What's Changed
- Add yet another pattern to IsNotExist by @danwinship in #108
- Feat: Support overriding binaries' path by @costasd in #114
- Fix: iptables stats tests for iptables >= 1.8.9 by @costasd in #113
- feat: add DeleteById function by @olljanat in #125
Full Changelog: https://github.com/coreos/go-iptables/compare/v0.7.0...v0.8.0
v0.7.0
Bug fixes
- (#107). Add another pattern to IsNotExist
- (#105). Skip warning about rules in legacy iptables
- (#104). iptables_test: fix ListWithCounters mismatch on newer kernels
New features
emicklei/go-restful (github.com/emicklei/go-restful/v3)
v3.13.0
- optimize performance of path matching in CurlyRouter ( thanks @wenhuang, Wen Huang)
go-logfmt/logfmt (github.com/go-logfmt/logfmt)
v0.6.1
Fixed
- Encode DEL (0x7f) control character by [@spaceone]
- Modernize code through Go 1.21 by [@ChrisHines]
grpc-ecosystem/grpc-gateway (github.com/grpc-ecosystem/grpc-gateway/v2)
v2.27.3
What's Changed
- refactor(runtime): using reflect.TypeFor by @cuiweixie in #5868
- fix(runtime): annotate context even if no incoming headers by @boolangery in #5887
- feat: add Opaque API and Protobuf Editions support by @kop in #5723
- fix: annotate healthz endpoint handler by @ZY-Ang in [#5914](https://redir
Configuration
📅 Schedule: Branch creation - On day 7 of the month, every 3 months ( * * 7 */3 * ) (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
- [ ] If you want to rebase/retry this PR, check this box
To execute skipped test pipelines write comment /ok-to-test.
This PR has been generated by MintMaker (powered by Renovate Bot).
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: Once this PR has been reviewed and has the lgtm label, please assign shach33 for approval. For more information see the Code Review Process.
The full list of commands accepted by this bot can be found here.
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment
Hi @red-hat-konflux[bot]. Thanks for your PR.
I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test label.
I understand the commands that are listed here.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.